Back to skill
Skillv1.0.32
ClawScan security
Agentshield Audit · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 1, 2026, 1:37 PM
- Verdict
- benign
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's code, instructions, and network interactions are consistent with a local security-audit / trust-handshake tool: it runs 77 local tests, stores private keys locally, and only sends a sanitized summary (test_id, passed, category) to a remote API — but you should verify the endpoint and run the dry-run before submitting real data.
- Guidance
- High-level: this package appears coherent for its stated purpose (local security tests + certificate-based trust handshake), and the authors built a dry-run + whitelist sanitization to avoid leaking test payloads. Before installing or running in production: 1) Run the dry-run mode (python3 initiate_audit.py --auto --dry-run) and inspect the exact payload the tool would submit. 2) Verify you are using v1.0.32 or later (notes indicate v1.0.31 had a sanitization bug). 3) Confirm the API endpoint you will contact (AGENTSHIELD_API) — if you don't trust agentshield.live, override the env var or run only locally. 4) Review the code that reads local files and the private key path (~/.openclaw/workspace/.agentshield/) and ensure permissions are appropriate. 5) If you run automated (--yes/--auto) mode, only do so in sandboxed or pre-audited environments. 6) If you want stronger assurances, run the package in an isolated VM/container and inspect network traffic during a dry-run. These steps minimize risk and verify the implementation matches the privacy claims.
- Findings
[ignore-previous-instructions] expected: The SKILL and attack-pattern files intentionally include prompt-injection strings (e.g., 'ignore previous instructions', 'jailbreak') because they are used as test vectors for prompt-injection detection. The static detector flagged them, which is expected for an audit tool. [unicode-control-chars] expected: The code and example prompts include checks for zero-width/RTL control characters (unicode attack vectors). The presence of these patterns in tests/prompt examples is expected and appropriate for an auditing suite. [dangerous-command-patterns] expected: agentshield_attack_patterns.json lists dangerous strings (e.g., 'rm -rf /', 'curl | bash') as attack payloads. Static scanners flag these, but this is deliberate as part of live attack simulations — expected for this tool. Do not run attack payloads against production systems.
Review Dimensions
- Purpose & Capability
- okThe name/description (AgentShield, trust layer + audits + handshake) align with the included scripts: audit runner, sanitizing API client, handshake/completion, key/cert handling, secret & supply-chain scanners. Network calls to a central API (agentshield.live) and local file/key access (~/.openclaw/workspace/.agentshield/) are expected for certificate issuance and handshake.
- Instruction Scope
- noteSKILL.md and the scripts instruct running local tests and optionally contacting the API. The docs explicitly describe human-in-the-loop consent before reading IDENTITY.md/SOUL.md and provide a --dry-run mode to preview payloads. The SKILL.md (and included example files) contains prompt-injection test strings and zero-width/unicode examples — these triggered static detectors but are legitimate test vectors for an auditing tool. Still: follow the recommended dry-run and consent flow before any real submission.
- Install Mechanism
- okThere is no remote installer; the package is a bundled Python toolset and SKILL.md instructs pip install -r requirements.txt (cryptography, requests). This is proportional to the task and does not fetch arbitrary code at runtime. No suspicious external download URLs were found in the provided manifest.
- Credentials
- noteThe skill declares no required credentials and only optional env vars (AGENTSHIELD_API, AGENT_NAME, OPENCLAW_AGENT_NAME). It reads local identity files and stores a private Ed25519 key locally (claimed mode 600). Those privileges are appropriate for generating/signing certificates, but they are sensitive: verify file paths/permissions and that you consent before the tool reads those files. The tool also performs network outbound to agentshield.live — expected, but verify the endpoint before sending data.
- Persistence & Privilege
- okalways:false and disable-model-invocation:false (normal). The skill stores keys and certificates in its own workspace directory and does not claim to modify other skills or system-wide agent settings. No 'always' or other elevated persistent privileges are requested.
